CHAPTER 1
Getting to Know Privileged Access Management 5
These materials are © 2022 John Wiley & Sons, Inc.
Any dissemination, distribution, or unauthorized use is strictly prohibited.
»SA accounts that are system admin accounts that help manage databases
»Root accounts that manage Unix/Linux
platforms »Accounts that run and manage Windows applications, services,
and scheduled tasks »IIS application pools (NET applications)
»Networking equipment accounts that give access to firewalls, routers,
and switchesAn example of a type of privileged account is a service account that requires special privileges to run, schedule a task, or an application. These accounts are often used
in a one-to-many situation, where a single account maybe used across an entire organization to run many services or applications.
Unfortunately, service accounts are often misused. To keep things running and avoid application downtime or insufficient privileges, they are often configured with high levels of privilege and passwords that are never changed and never expire. These common practices create a dangerous vulnerability for any organization.
Who Uses Privileged Accounts and Where They Are LocatedThe typical user of a privileged account is a system administrator sysadmin) responsible for managing an environment or an IT administrator of specific software or hardware. These individuals can perform the following:
»Install system hardware/software
»Access sensitive data
»Reset passwords for others
Share with your friends: